Title: Edge computing-based security authentication algorithm for multiple RFID tags

Authors: He Xu; Jie Ding; Peng Li; Ruchuan Wang

Addresses: School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China; Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China ' School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China ' School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China; Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China ' School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China; Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China

Abstract: Edge computing is emergence for improving the performance of cloud-based and internet of things systems. In this paper, a multi-tag authentication algorithm based on edge computing is proposed. The algorithm regards RFID reader and tag as the nodes of edge computing, and uses the tag and reader's computing ability to process and streamline the security authentication information. The authentication server can perform multiple tags' certification and identify false tags in RFID systems. The algorithm reduces the pressure on the authentication server and avoids many signal collisions in wireless channels. The tag has the ability to calculate the equivalent of the node in the proposed edge computing systems, and handle its own ID to be detected by the reader as 1 bit signal, which can prevent too much information interaction between the tag and the reader, therefore, it can protect the privacy of tags.

Keywords: radio frequency identification; RFID; security; authentication; edge computing; privacy.

DOI: 10.1504/IJIIDS.2018.092000

International Journal of Intelligent Information and Database Systems, 2018 Vol.11 No.2/3, pp.132 - 152

Received: 06 Sep 2017
Accepted: 04 Nov 2017

Published online: 24 May 2018 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article